|
| Nazwa oprogramowania |
Strona domowa |
Pobierane |
| GnuPG.pm |
http://indev.insu.com/GnuPG/ |
1978x |
|
The GnuPG perl module interfaces with the Gnu Privacy Guard using the coprocess hooks provided by gpg.
|
|
|
| THC-UnixHackingTools |
http://www.thc.org |
1977x |
|
Unix rootkit.
|
|
|
| ip-masq-log |
http://www.cli.di.unipi.it/[..]zunino/linux/ |
1976x |
|
This patch can be used on a masquerading firewall (NAT) to keep a log of all the outgoing masqueraded TCP connections.
|
|
|
| LinVPN |
http://mrtg.planetmirror.com/pub/linvpn/ |
1972x |
|
LinVPN allows you to create a VPN (Virtual Private Network) from linux to linux. Normally both are gateways of a LAN, then the LANs behind them may access each other over an encrypted tunnel created by the software.
|
|
|
| Makejail |
http://www.floc.net/makejail/ |
1971x |
|
Makejail oferuje krótkie pliki konfiguracyjne pomagające administratorom tworzyć i zarządzać środowiskami chroot jail.
|
|
|
| THC-Rut |
http://www.thc.org |
1969x |
|
THC-RUT (aRe yoU There, pronouced as root) is your first knife on foreign network. It gathers informations from local and remote networks. It offers a wide range of network discovery tools: arp lookup on an IP range, spoofed DHCP request, RARP, BOOTP, ICMP-ping, ICMP address mask request, OS fingerprintings, high-speed host discovery, ... The tool is capable of discovering a Class B network within 10 minutes.
|
|
|
| fcatalog |
http://fcatalog.lupine.org/ |
1969x |
|
fcatalog is a program for identifying the origins of files. Though its operation is similar to the operation of file-checksum-checking security utilities (like tripwire), its purpose and methodology is different.
|
|
|
| THC-SecureDelete |
http://www.thc.org/ |
1969x |
|
Tool for secure deleting files.
|
|
|
| THC-WarDrive |
http://www.thc.org |
1969x |
|
The major focus of THC is to investigate and analyze common security solutions and propose concepts for circumventing security mechanisms.
|
|
|
| yyyRSA |
http://www.erikyyy.de/yyyRSA/ |
1968x |
|
A simple program to encrypt and decipher messages with
the RSA asymetrical encryption algorithm.
|
|
|
| THC-Vmap |
http://www.thc.org |
1968x |
|
Vmap stands for version mapper. It allows you to find out the version of a daemon by fingerprinting the features and replys of bogus commands. It's a great addition to the other *map tools.
|
|
|
| Riley |
http://www3.telus.net/[..]er/riley.html |
1968x |
|
Riley is a file integrity checker written in Perl,somewhat similar to Tripwire.
|
|
|
| keymgr |
http://www.rcpt.to/keymgr/ |
1962x |
|
Keymgr is a cryptographic policy engine.
|
|
|
| chkrootkit |
http://www.chkrootkit.org/ |
1962x |
|
chkrootkit to narzędzie do lokalnego wykrywania rootkitów. Pakiet zawiera chrootkit: skrypt powłoki, który sprawdza binarki systemowe w poszukiwaniu modyfikacji rootkitem. Jest w stanie sprawdzić: aliens, asp, bindshell, lkm, rexedcs, sniffer, wted, z2, amd, basename, biff, chfn, chsh, cron, date, du, dirname, echo, egrep, env, find, fingerd, gpm, grep, hdparm, su, ifconfig, inetd, inetdconf, identd, killall, login, ls, mail, mingetty, netstat, named, passwd, pidof, pop2, pop3, ps, pstree, rpcinfo, rlogind, rshd, slogin, sendmail, sshd, syslogd, tar, tcpd, top, telnetd, timed, traceroute i write.
|
|
|
| KPGPCrypt |
http://members.tripod.com/[..]ssi/index.htm |
1959x |
|
Key Managment for PGP 5.xx, PGP 6.xx and GPG 1.xx. Supports Add, Delete, Sign, Revoke, Disable Enable keys in graphical environment
|
|
|
|

Szukanie oprogramowania
|